.png)
Belgium 21-4-26 Invitation Only Physical english
In an era where every outage, audit, and cyberattack is a test of organisational survival, resilience has become the new currency of trust. While traditional perimeter security with: firewalls, intrusion detection, and scanners, remains essential, it is no longer a sufficient guarantee against modern threats that bypass these layers to penetrate your core systems. Today, enterprises require security and continuity that are built-in, not bolted-on. This CIONET roundtable focuses on the shift from reactive disaster recovery to proactive Business Continuity. Together with experts from HPE Zerto, we will explore how organisations can transform their recovery strategies into seamless continuity models.
Read More
Belgium 23-4-26 Country Members Physical & Virtual english
AI is no longer confined to supporting human tasks. We are entering the agentic era, where autonomous systems act on behalf of people and organisations. These agents can gather information, make decisions, negotiate terms, and even complete transactions. The implications extend well beyond technology; they touch the very foundations of business models, governance, and leadership. For CIOs and their peers, the rise of “machine customers” and autonomous partners poses new questions: Market impact: How do you compete and create value when some customers and suppliers are machines? Governance: What trust, compliance, and accountability structures are needed when AI acts independently in financial, procurement, or customer-facing processes? Leadership: How should CIOs guide their organisations in redefining roles, responsibilities, and decision-making when agents take over parts of the value chain?Business strategy: What opportunities emerge for new revenue models, platforms, and ecosystems shaped by autonomous interaction? This session shifts the focus from the mechanics of AI agents to the decisions that will shape leadership in the next decade. It is a call for CIOs to prepare for a future where relationships, markets, and strategies are no longer limited to human-to-human interactions, but also extend to human-to-machine and machine-to-machine interactions.
Read More
Belgium 29-4-26 Invitation Only Physical english
This CIONET workshop is a collaborative deep-dive into the practicalities of"rewiring the building" while it’s still occupied. Drawing onKyndryl’s deep heritage in mission-critical infrastructure and their latestresearch, we will dismantle the "hidden costs" of legacyenvironments. The conversation will focus on the transition from static,monolithic structures to composable architectures that allow intelligent agentsto operate seamlessly across hybrid landscapes.
Read More
April 2, 2026 Squad Session Invitation Only Virtual english
SaaS gave business units freedom: quick onboarding, no infrastructure, and instant results. But over time, that freedom turned into fragmentation. Each team now buys, renews, and configures its own stack. HR has one platform, finance has another, and marketing probably has ten. The invoices keep coming, usage keeps dropping, and no one is sure who’s accountable for what.
Read More
May 12, 2026 Squad Session Invitation Only Physical english
Everyone says they’ve gone product-centric. In reality, most organisations live in a hybrid world where projects, products, and platforms overlap. Teams manage releases while still chasing deadlines, and governance still thinks in milestones rather than outcomes. The shift is underway, but the mindset hasn’t caught up.
Read More
May 19, 2026 Squad Session Invitation Only Physical english
The game has changed, clearly. Attackers have AI, defenders have AI, and both sides are learning faster than anyone expected, or maybe the attackers are just a bit faster. What used to take hours now happens in seconds, and detection windows close before alerts even appear. It’s adaptation beyond automation, and no one gets to sit still.
Read More
CIONET Trailblazer: CISO: The Shift from Prevention to Resilience: Turning Visibility into Execution
Published on: January 28, 2026 @ 9:48 AM
CIONET Trailblazer: AI Transformation: Bridging the Cultural Divide to Achieve Competitive Advantage
Published on: December 17, 2025 @ 9:16 AM
How Atlassian Enforces Best Practices in Its Cloud Infrastructure
How Atlassian Enforces Best Practices in Its Cloud Infrastructure
INTRODUCTION
This is an updated version of an October 2019 post from the ATLASSIAN Community – How Atlassian enforces Best Practices in its Cloud Infrastructure. Link to original blog post.
The majority of Atlassian’s business runs on Amazon Web Services (AWS). Due to the large scale of our infrastructure, we allow for teams to manage their own changes without a centralised review. Atlassian operates on a “trust, but verify” model: We promote a set of best practices and guidelines for teams to follow and we then check that these best practices are being implemented. Where the target is missed, we help the team readjust.
The most widely known example are S3 buckets that are publicly available and can be accessed by anyone. Countless companies have been caught off guard by accidentally putting confidential information in public buckets. It has prompted Amazon to offer additional safeguards in the form of bucket-level overrides to deny any sort of public object, acknowledging the severity of this problem.
At Atlassian, we have added a new tool to our vulnerability management belt so we can assist teams in following the best practices we have established: Trend Micro Cloud One™ – Conformity which specialises in continuously scanning the configuration of cloud infrastructure.
While they offer support for multiple cloud providers as well as checks for all five pillars of the well-architected framework, we use the tool for its “Security” checks for AWS.
ADOPTION
Nearly all of our AWS accounts are being scanned on an hourly basis and the results are reported to the security team. To enable our developers to move fast and remove security as a gatekeeper we didn’t stop there, though. Instead, we integrated Cloud One - Conformity with our vulnerability pipeline which files Jira tickets for any findings we discover through these scans. Our developers live and breathe Jira day in, day out, so surfacing this information here is much more natural for them than having to look for these findings in some third party tool or needing security as an intermediary.
Anyone who has ever tried to deploy a security scanner inside an organisation knows that they are never set-and-forget. Instead, they require fine-tuning to ensure they only produce meaningful results. Every enterprise environment is different and particularly at scale, edge cases exist that scanners would not anticipate. For example, our internal PaaS enforces a set of best practices that have been developed in collaboration with the security team. Some of the configurations that come out of this are secure in this context, but the scanner will still report on them because they generally wouldn’t be. As a result, we spent some time refining the set of rules we care about.
In our first iteration, we decided to focus on our highest severity AWS accounts. These accounts hold our customers' data or manage our infrastructure, for example our CI/CD. In addition, we narrowed down the initial set of rules to those we consider high severity. We then spent some time working closely with those teams that own these important AWS accounts to ensure all findings provide a meaningful security benefit. Based on this feedback, we adjusted the configuration of our rules to fit right into our organisation. Only for this subset of accounts & rules are we creating Jira tickets, as we have verified the quality of these findings.
The next iteration has already started and is expanding out the scope of accounts having Jira tickets created as well as including more rules that are being reviewed. Eventually, all our AWS accounts will be under our security SLA and every check will have been reviewed and configured to the specifics of our environment.
We also continue working closely with the Conformity team, who are responsive to our feedback and quickly fix any bugs we discover in their product. They are great at including our feature requests in their roadmap and always keep us informed on when work is starting on anything we care about. This way, we keep increasing the value their service provides to us which directly translates into an ever increasing security posture.
When the security researcher “benmap” presented at DEF CON 27 recently, the community learned just how vulnerable public EBS volumes can leave a company, reminding everyone that not just S3 buckets can be made public and contain sensitive information. Naturally, we investigated our own environment for such public volumes. Since Conformity was already actively scanning all of our accounts, we were able to perform a fast investigation that gave a complete picture of all public volumes and we could quickly confirm that none of them contained any sensitive information. In addition, we will be alerted to any future volumes that are being made public and can ensure we are not exposing any sensitive information through them.
As a helpful side-effect these scans provide a forcing function for teams to go into their own environments and clean up any stale resources left over from development experiments. Atlassian enables our developers to iterate quickly, try out new features and innovate on our services. As a security team, we are responsible for making sure that these experiments happen within a suitable environment and in a way that don’t put customer data at risk. Part of this responsibility is making sure that unused resources are being cleaned up and Conformity helps us achieve this. We notify developers about resources with insecure configurations and sometimes developers realise they do not need those resources anymore and delete them.
With a tool like Trend Micro Cloud One - Conformity in our arsenal, we now have ongoing assurance that our cloud infrastructure is in a good and secure state.
We go beyond just vulnerabilities and use it to actually enforce best practices, which ensures our cloud security posture is best of breed.
91 Views 1 Likes Read More
CIONET’s Cyber Circle: a new three-event programme exclusively focusing on the most urgent, complex, and high-impact challenges in cybersecurity today. Launched in 2026, this initiative brings together CISOs, CIOs, and senior IT executives with a strong interest in cybersecurity for three curated gatherings each year. As part of CIONET’s trusted executive community, the Cyber Circle provides a confidential, peer-driven environment to exchange insights, share real-world experiences, and address evolving cyber threats. Each session is designed to foster strategic dialogue, strengthen resilience, and elevate cybersecurity as a core driver of business value.
Read More
The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.
Read More
Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !
Read More
CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.
Read More
Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!
You can either send us a registered handwritten letter explaining why you'd like to become a member or you can simply talk to us right here!